Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Gamal Selim"'
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 14:6077-6094
A modified XXTEA “M-XXTEA” symmetric block cipher that has a simple construction compared to the advanced encryption standard (AES) is proposed. It is efficient for protecting limited-resource devices such as IoT smart devices. The M-XXTEA will b
Publikováno v:
European Journal of Engineering Science and Technology. 3:58-79
Alzheimer's disease (AD) is a significant regular type of dementia that causes damage in brain cells. Early detection of AD acting as an essential role in global health care due to misdiagnosis and sharing many clinical sets with other types of demen
Publikováno v:
International Journal of Computing. :208-215
Quality of live video streaming technology is based on quality of Experiences parameters (QoE). Approaching the peer-to-peer (P2P) or peer-assisted networks as a sympathetic solution is highly required, especially in light of its authentic scalabilit
Alzheimer's disease (AD) detection acting as an essential role in global health care due to misdiagnosis and sharing many clinical sets with other types of dementia, and costly monitoring the progression of the disease over time by magnetic reasoning
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ace7e630daeeca9e4c55186b09c08af9
Alzheimer's disease (AD) is a significant regular type of dementia that causes damage in brain cells. Early detection of AD acting as an essential role in global health care due to misdiagnosis and sharing many clinical sets with other types of demen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bd21d32adcee55c9fa15f4b645f87169
The paper demonstrates the analysis of Corona Virus Disease based on a probabilistic model. It involves a technique for classification and prediction by recognizing typical and diagnostically most important CT images features relating to Corona Virus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::26c805cfd01bf50fffb4f4fdc906e6dd
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030325190
There are limited numbers of reliable hybrid cryptosystems that can be used to protect IoT smart devices, specifically in smart cities, smart hospitals, smart homes, and industrial fields. Therefore, much related work has to be performed. The aim is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aaa8e7535a57a5bf0778ea97b84b3677
https://doi.org/10.1007/978-3-030-32520-6_62
https://doi.org/10.1007/978-3-030-32520-6_62
Publikováno v:
Security, Privacy, and Anonymity in Computation, Communication, and Storage ISBN: 9783030248994
SpaCCS Workshops
SpaCCS Workshops
There are limited numbers of reliable hybrid cryptosystems that can be used to protect IoT smart devices, specifically in smart cities, smart hospitals, smart homes, and industrial fields. Therefore, much related work has to be performed. The aim is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e96ebb6ba46bf34eb967b2723411111
https://doi.org/10.1007/978-3-030-24900-7_1
https://doi.org/10.1007/978-3-030-24900-7_1
Publikováno v:
Proceedings of the 7th International Conference on Software and Information Engineering.
Nowadays Voice over Internet Protocol (VoIP) is one of the most widely used technologies to transmit the voice. With the widely spreading in such technology many counters attaches tried to apply different counter measure. In this paper we tried to bu
Publikováno v:
Journal of Advanced Research
Journal of Advanced Research, Vol 5, Iss 4, Pp 499-505 (2014)
Journal of Advanced Research, Vol 5, Iss 4, Pp 499-505 (2014)
The problem of hardware Trojans is becoming more serious especially with the widespread of fabless design houses and design reuse. Hardware Trojans can be embedded on chip during manufacturing or in third party intellectual property cores (IPs) durin